G4LB1T / LazySLinks
PoC malware built by copy-paste
☆25Updated 4 years ago
Alternatives and similar repositories for LazyS
Users that are interested in LazyS are comparing it to the libraries listed below
Sorting:
- Various config files obtained during malware analysis☆67Updated 7 years ago
- Reflective Polymorphism☆109Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Updated 8 years ago
- ☆136Updated 6 years ago
- Various scripts for different malware families☆106Updated 4 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Automatically exported from code.google.com/p/malware-lu☆56Updated 6 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- ☆44Updated 7 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 6 years ago
- a modified version base on Tracecorn☆20Updated 6 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Updated 8 years ago
- Emulating Virtual Environment to stay protected against advanced malware☆100Updated 6 years ago
- Handy scripts to speed up malware analysis☆35Updated 2 years ago
- ☆68Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- Modified edition of cuckoo community modules☆32Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Updated 11 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- Telsy CTI Research Team☆57Updated 5 years ago
- Static based decoders for malware samples☆94Updated 5 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 8 years ago
- API Tracker by Cysinfo Team☆22Updated 9 years ago